Heuristic

Heuristic, pronounced hyoo-ri-stihk, is a Greek term for individually finding or discovering. In computer science, it refers to a method of finding an acceptable solution to a problem in order to continue a process, often searching through data. Usually the solution is a replacement algorithm when an ideal one doesn’t exist.

In computing, heuristics allow professionals to find solutions faster. The advantage of applying a heuristic, such as a search method in a large database, is speed, rather than complete accuracy. However, heuristics in technology are often accurate and strategic. Heuristic-based decisions are based on patterns suggested by data sets.  So while heuristics can arrive at an “answer” more quickly than close analysis of each data point, they will not always deliver  the ideal or perfect solution for a program or computation.

Heuristics are not most efficient for every computational situation. When a solution to a program or problem must always be clear and precise, taking time to calculate the true best solution is often the more efficient choice, such as applications that require an exact, ideal computation. But often, heuristics save time by permitting a quick search or next step to be made. They are used in some artificial intelligence applications when an exact algorithm is unknown.

Heuristics in databases

Searching through large databases can take a large amount of time, which is why heuristics are helpful for data scientists who need to find good search results. Heuristic approaches in database searches attempt to make searches more efficient through speed, reducing the number of queries that must be made.

Heuristic analysis

Heuristic analysis is used by antivirus tools to search through files for possible viruses or malicious traffic. Heuristic analysis will not identify every threat perfectly, but it’s still a method for catching potential threats. Heuristic analysis uses continuously updated databases of known or emerging trends in virus and security risks to identify potential viruses within files. Once tagged, the tool quarantines those files from the system until a user can identify them as legitimate or malicious.

 

Jenna Phipps
Jenna Phipps
Jenna Phipps is a writer for Webopedia.com, Enterprise Storage Forum, and CIO Insight. She covers data storage systems and data management, information technology security, and enterprise software solutions.

Related Articles

Defense Advanced Research Projects Agency (DARPA)

The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense (DOD). The agency stands...

Merkle Tree

Merkle trees—or hash trees—are cryptographic algorithms allowing for the efficient validation of large data structures and are critical to the development of secure computing...

Raspberry Pi

Raspberry Pi (RP) is the educational charity and namesake line of microcomputers offering customers a low-cost, single-board computer for lightweight computing purposes. While Raspberry Pi...

Database Management System (DBMS)

A database management system (DBMS) is software that handles the storage, retrieval, and updating of data in a computer system. It serves as an...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...